Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments.
How can deception technology offer a new alternative?
The key to deception technology is to deter lateral movement inside a network. On...
Cloud providers have transformed from offering a fringe platform utilized by courageous companies on technology's leading edge into a cloud-first, standard, go-to approach for running all sorts of business-critical systems. According to IDC, nearly 50% of IT infrastructure spend will be on private/public clouds by...
Cybercriminals are organized, well funded, and highly motivated. They are deploying advanced malware, leveraging cloud-based computing resources, and developing cutting edge tools to attack your organization's data.security defenses.
The proliferation of online devices accessing personal and financial information,...
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
In spite of all the news about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering.
Successful hackers know the user is the weakest link in the security chain. Email phishing campaigns have proven to be...
Choosing the right password solution for your business means defining your unique needs, and finding the product that best delivers on those needs while answering two fundamental questions: Is it safe and reliable? Does it help achieve your security goals while enforcing better policies?
Download this whitepaper...
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
As the time rapidly approaches for enforcement on GDPR, even organizations outside of the Europen Union that are conducting business within that region will be subject to a new set of laws to protect personal identification information. The legislation replaces a two-decade-old EU directive that remained largely...
According to a recent report, The Identity Fraud Study, released by Javelin Strategy & Research, it showed in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping...
The GDPR regulation will be enforced beginning May 25, 2018 and for many organizations, the initial transition to GDPR compliance is likely to be a lengthy and challenging process that will require regular reevaluation based on continued reassessment of the risks.
The role of network security in preventing...
Effective in May of 2018, the GDPR regulation marks a colossal shift in the treatment and handling of personal data. And while the GDPR is an EU policy, its effects aren't limited to European borders.
On top of the implications the policy has on global companies with ties to the European market, the GDPR also marks...
Insights are everywhere. But uncovering them can sometimes take more than a one-off glance.
Based on analysis of 15,000 RSA Conference Call for Paper submissions, this whitepaper lays out a critical 10-year timeline in cybersecurity while addressing all angles of the industry conversation, from the growing hype...
Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments. How can deception technology offer a new alternative?
The key to deception technology is to deter lateral movement inside a network. On each...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.